Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: security safe

2368 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 680
2367 Cuckoo Search Optimization for Black Scholes Option Pricing

Authors: Manas Shah

Abstract:

Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).

Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm

Procedia PDF Downloads 441
2366 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 251
2365 Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia

Authors: Wasmi Woishi

Abstract:

Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data.

Keywords: smart card technology, healthcare using smart cards, smart healthcare cards, KSA healthcare information system, cloud-based healthcare cards

Procedia PDF Downloads 154
2364 An E-Retailing System Architecture Based on Cloud Computing

Authors: Chanchai Supaartagorn

Abstract:

E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.

Keywords: architecture, cloud computing, e-retailing, internet-based

Procedia PDF Downloads 383
2363 Implementation of Model Reference Adaptive Control in Tuning of Controller Gains for Following-Vehicle System with Fixed Time Headway

Authors: Fatemeh Behbahani, Rubiyah Yusof

Abstract:

To avoid collision between following vehicles and vehicles in front, it is vital to keep appropriate, safe spacing between both vehicles over all speeds. Therefore, the following vehicle needs to have exact information regarding the speed and spacing between vehicles. This project is conducted to simulate the tuning of controller gain for a vehicle-following system through the selected control strategy, spacing control policy and fixed-time headway policy. In addition, the paper simulates and designs an adaptive gain controller for a road-vehicle-following system which uses information on the spacing, velocity and also acceleration of a preceding vehicle in the proposed one-vehicle look-ahead strategy. The mathematical model is implemented using Kirchhoff and Newton’s Laws, and stability simulated. The trial-error method was used to obtain a suitable value of controller gain. However, the adaptive-based controller system was able to optimize the gain value automatically. Model Reference Adaptive Control (MRAC) is designed and utilized and based on firstly the Gradient and secondly the Lyapunov approach. The Lyapunov approach considers stability. The Gradient approach was found to improve the best value of gain in the controller system with fixed-time headway.

Keywords: one-vehicle look-ahead, model reference adaptive, stability, tuning gain controller, MRAC

Procedia PDF Downloads 225
2362 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 222
2361 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 509
2360 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 127
2359 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 61
2358 The Clash of the Clans in the British Divorce

Authors: Samuel Gary Beckton

Abstract:

Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.

Keywords: identity, nationalism, Scotland, unionism

Procedia PDF Downloads 153
2357 Risk Assessment of Radiation Hazard for a Typical WWER1000: Cancer Risk Analysis during a Hypothetical Accident

Authors: R. Gharari, N. Kojouri, R. Hosseini Aghdam, E. Alibeigi, B. Salmasian

Abstract:

In this research, the WWER1000/V446 (a PWR Russian type reactor) is chosen as the case study. It is assumed that radioactive materials that release into the environment are more than allowable limit due to a complete failure of the ventilation system (reactor stack). In the following, the HOTSPOT and the RASCAL computational codes have been used and coupled with a developed program using MATLAB software to evaluate Total effective dose equivalent (TEDE) and cancer risk according to the BEIR equations for various human organs. In addition, effects of the containment spray system and climate conditions on the TEDE have been investigated. According to the obtained results, there is an inverse correlation between the received dose and the wind speed; the amount of the TEDE for wind speed 2 m/s and is more than wind speed for 14 m/s during the class A of the climate (2.168 and 0.444 mSv, respectively). Also, containment spray system can effect and reduce the amount of the fission products and TEDE. Furthermore, the probability of the cancer risk for women is more than men, and for children is more than adults. In addition, a specific emergency zonal planning is proposed. Results are promising in which the site selection of the WWER1000/V446 were considered safe for the public in this situation.

Keywords: TEDE, total effective dose equivalent, RASCAL and HOTSPOT codes, BEIR equations, cancer risk

Procedia PDF Downloads 156
2356 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 379
2355 Mathematical Modeling of the Working Principle of Gravity Gradient Instrument

Authors: Danni Cong, Meiping Wu, Hua Mu, Xiaofeng He, Junxiang Lian, Juliang Cao, Shaokun Cai, Hao Qin

Abstract:

Gravity field is of great significance in geoscience, national economy and national security, and gravitational gradient measurement has been extensively studied due to its higher accuracy than gravity measurement. Gravity gradient sensor, being one of core devices of the gravity gradient instrument, plays a key role in measuring accuracy. Therefore, this paper starts from analyzing the working principle of the gravity gradient sensor by Newton’s law, and then considers the relative motion between inertial and non-inertial systems to build a relatively adequate mathematical model, laying a foundation for the measurement error calibration, measurement accuracy improvement.

Keywords: gravity gradient, gravity gradient sensor, accelerometer, single-axis rotation modulation

Procedia PDF Downloads 316
2354 Responsibility to Protect: The Continuing Post-Colonial Western Hegemony

Authors: Helyeh Doutaghi

Abstract:

In 2005, the doctrine of Responsibility to Protect (R2P) was created by the UN Member States agreeing to not only to have the primary responsibility to protect their civilians from genocide, war crimes, crimes against humanity and ethnic cleansing, but also to be responsible towards those civilians whose State was found manifestly failing in that regard. This paper will assess the doctrine of R2P and will argue that R2P too, just like humanitarian intervention, suffers from a lack of legal basis and political will to implement it. Or better said, it is being selectively used by the hegemon’s power to achieve its political will. In doing so, the origin and development shall be explained. Furthermore, it will be submitted that R2P has failed to achieve its purpose due to the unresolved Security Council’s deadlock. Lastly, the concept of legal morality entailed in R2P and its use in real life cases since 2005 will be examined.

Keywords: responsibility to protect, humanitarian intervention, United Nations, legitimacy, legality

Procedia PDF Downloads 329
2353 Analysis of Influence of Geometrical Set of Nozzles on Aerodynamic Drag Level of a Hero’s Based Steam Turbine

Authors: Mateusz Paszko, Miroslaw Wendeker, Adam Majczak

Abstract:

High temperature waste energy offers a number of management options. The most common energy recuperation systems, that are actually used to utilize energy from the high temperature sources are steam turbines working in a high pressure and temperature closed cycles. Due to the high costs of production of energy recuperation systems, especially rotary turbine discs equipped with blades, currently used solutions are limited in use with waste energy sources of temperature below 100 °C. This study presents the results of simulating the flow of the water vapor in various configurations of flow ducts in a reaction steam turbine based on Hero’s steam turbine. The simulation was performed using a numerical model and the ANSYS Fluent software. Simulation computations were conducted with use of the water vapor as an internal agent powering the turbine, which is fully safe for an environment in case of a device failure. The conclusions resulting from the conducted numerical computations should allow for optimization of the flow ducts geometries, in order to achieve the greatest possible efficiency of the turbine. It is expected that the obtained results should be useful for further works related to the development of the final version of a low drag steam turbine dedicated for low cost energy recuperation systems.

Keywords: energy recuperation, CFD analysis, waste energy, steam turbine

Procedia PDF Downloads 198
2352 Pharmacodynamic Enhancement of Repetitive rTMS Treatment Outcomes for Major Depressive Disorder

Authors: A. Mech

Abstract:

Repetitive transcranial magnetic stimulation has proven to be a valuable treatment option for patients who have failed to respond to multiple courses of antidepressant medication. In fact, the American Psychiatric Association recommends TMS after one failed treatment course of antidepressant medication. Genetic testing has proven valuable for pharmacokinetic variables, which, if understood, could lead to more efficient dosing of psychotropic medications to improve outcomes. Pharmacodynamic testing can identify biomarkers, which, if addressed, can improve patients' outcomes in antidepressant therapy. Monotherapy treatment of major depressive disorder with methylated B vitamin treatment has been shown to be safe and effective in patients with MTHFR polymorphisms without waiting for multiple trials of failed medication treatment for depression. Such treatment has demonstrated remission rates similar to antidepressant clinical trials. Combining pharmacodynamics testing with repetitive TMS treatment with NeuroStar has shown promising potential for enhancing remission rates and durability of treatment. In this study, a retrospective chart review (ongoing) of patients who obtained repetitive TMS treatment enhanced by dietary supplementation guided by Pharmacodynamic testing, displayed a greater remission rate (90%) than patients treated with only NeuroStar TMS (62%).

Keywords: improved remission rate, major depressive disorder, pharmacodynamic testing, rTMS outcomes

Procedia PDF Downloads 39
2351 Quality of Life of Elderly and Factors Associated in Bharatpur Metropolitan City, Chitwan: A Mixed Method Study

Authors: Rubisha Adhikari, Rajani Shah

Abstract:

Introduction: Aging is a natural, global and inevitable phenomenon every single person has to go through, and nobody can escape the process. One of the emerging challenges to public health is to improve the quality of later years of life as life expectancy continues to increase. Quality of life (QoL) has grown to be a key goal for many public health initiatives. Population aging has become a global phenomenon as they are growing more quickly in emerging nations than they are in industrialized nations, leaving minimal opportunities to regulate the consequences of the demographic shift. Methods: A community-based descriptive analytical approach was used to examine the quality of life and associated factors among elderly people. A mixed method was chosen for the study. For the quantitative data collection, a household survey was conducted using the WHOQOL-OLD tool. In-depth interviews were conducted among twenty participants for qualitative data collection. Data generated through in-depth interviews were transcribed verbatim. In-depth interviews lasted about an hour and were audio recorded. The in-depth interview guide had been developed by the research team and pilot-tested before actual interviews. Results: This study result showed the association between quality of life and socio-demographic variables. Among all the variables under socio-demographic variable of this study, age (ꭓ2=14.445, p=0.001), gender (ꭓ2=14.323, p=<0.001), marital status (ꭓ2=10.816, p=0.001), education status (ꭓ2=23.948, p=<0.001), household income (ꭓ2=13.493, p=0.001), personal income (ꭓ2=14.129, p=0.001), source of personal income (ꭓ2=28.332,p=<0.001), social security allowance (ꭓ2=18.005,p=<0.001), alcohol consumption (ꭓ2=9.397,p=0.002) are significantly associated with quality of life of elderly. In addition, affordability (ꭓ2=12.088, p=0.001), physical activity (ꭓ2=9.314, p=0.002), emotional support (ꭓ2=9.122, p=0.003), and economic support (ꭓ2=8.104, p=0.004) are associated with quality of life of elderly people. Conclusion: In conclusion, this mixed method study provides insight into the attributes of the quality of life of elderly people in Nepal and similar settings. As the geriatric population is growing in full swing, maintaining a high quality of life has become a major challenge. This study showed that determinants such as age, gender, marital status, education status, household income, personal income, source of personal income, social security allowance and alcohol consumption, economic support, emotional support, affordability and physical activity have an association with quality of life of the elderly.

Keywords: ageing, chitwan, elderly, health status, quality of life

Procedia PDF Downloads 49
2350 Hot Corrosion Susceptibility of Uncoated Boiler Tubes during High Vanadium Containing Fuel Oil Operation in Boiler Applications

Authors: Nicole Laws, William L. Roberts, Saumitra Saxena, Krishnamurthy Anand, Sreenivasa Gubba, Ziad Dawood, Aiping Chen

Abstract:

Boiler-fired power plants that operate steam turbines in Saudi Arabia use vanadium-containing fuel oil. In a super- or sub-critical steam cycle, the skin temperature of boiler tube metal can reach close to 600-1000°C depending on the location of the tubes. At high temperatures, corrosion by the sodium-vanadium-oxygen-sulfur eutectic can become a significant risk. The experimental work utilized a state-of-the-art high-temperature, high-pressure burner rig at KAUST, King Abdullah University of Science and Technology. To establish corrosion rates of different boiler tubes and materials, SA 213 T12, SA 213 T22, SA 213 T91, and Inconel 600, were used under various corrosive media, including vanadium to sulfur levels and vanadium to sodium ratios. The results obtained from the experiments establish a corrosion rate map for the materials involved and layout an empirical framework to rank the life of boiler tube materials under different operating conditions. Safe windows of operation are proposed for burning liquid fuels under varying vanadium, sodium, and sulfur levels before corrosion rates become a matter of significance under high-temperature conditions

Keywords: boiler tube life, hot corrosion, steam boilers, vanadium in fuel oil

Procedia PDF Downloads 209
2349 Malignancy in Venous Thromboembolism

Authors: Naser Shagerdi Esmaeli, Mohsen Hamidpour

Abstract:

Purposes: The activation of coagulation in patients with cancer contributes significantly to morbidity and mortality rates and may play a fundamental role in the host response to growing tumor’s. Patients with cancer are clearly at high risk for the development of venous thromboembolism (VTE), particularly during chemotherapy and surgery. This situation is aggravated by the use of venous access catheters and possibly growth factors. Methods: Data derived from large, randomized, controlled trials have been used to determine the true incidence of this complication of cancer and its treatment. The incidence based on the analyses of these randomized controlled trials varies from 1% for limited stage patients with breast cancer treated with tamoxifen to 60% for patients with any type of cancer who are subjected to orthopedic surgery and do not receive prophylactic therapy. Results: In view of the morbidity and mortality attributable to VTE in cancer, widespread utilization of prophylactic anticoagulation therapy, which has proven safe and effective in a variety of situations, should be considered. While migratory thrombophlebitis is a clear indicator of an underlying neoplasm, the risk of cancer in patients with the more typical form of VTE has been the subject of intense debate over recent years. Conclusion: Some investigators have suggested that the relative risk of being diagnosed with occult cancer within six months of an episode of VTE (particularly recurrent VTE) could be up to 10-fold. However, the cost-effectiveness of aggressive screening for cancer in patients with VTE has not yet been defined adequately.

Keywords: venous thromboembolism, malignancy, cancer, tumor, heparin

Procedia PDF Downloads 84
2348 Biofertilization of Cucumber (Cucumis sativus L.) Using Trichoderma longibrachiatum

Authors: Kehinde T. Kareem

Abstract:

The need to increase the production of cucumber has led to the use of inorganic fertilizers. This chemical affects the ecological balance of nature by increasing the nitrogen and phosphorus contents of the soil. Surface runoffs into rivers and streams cause eutrophication which affects aquatic organisms as well as the consumers of aquatic animals. Therefore, this study was carried out in the screenhouse to investigate the use of a plant growth-promoting fungus; Trichoderma longibrachiatum for the growth promotion of conventional and in-vitro propagated Ashley and Marketmoor cucumber. Before planting of cucumber, spore suspension (108 cfu/ml) of Trichoderma longibrachiatum grown on Potato dextrose agar (PDA) was inoculated into the soil. Fruits were evaluated for the presence of Trichoderma longibrachiatum using a species-specific primer. Results revealed that the highest significant plant height produced by in-vitro propagated Ashley was 19 cm while the highest plant height of in-vitro propagated Marketmoor was 19.67 cm. The yield of the conventional propagated Ashley cucumber showed that the number of fruit/plant obtained from T. longibrachiatum-fertilized plants were significantly more than those of the control. The in-vitro Ashely had 7 fruits/plant while the control produced 4 fruits/plant. In-vitro Marketmoor had ten fruits/plant, and the control had a value of 4 fruits/plant. There were no traces of Trichoderma longibrachiatum genes in the harvested cucumber fruits. Therefore, the use of Trichoderma longibrachiatum as a plant growth-promoter is safe for human health as well as the environment.

Keywords: biofertilizer, cucumber, genes, growth-promoter, in-vitro, propagation

Procedia PDF Downloads 225
2347 Active Treatment of Water Chemistry for Swimming Pools Using Novel Automated System (NAS)

Authors: Saeed Asiri

Abstract:

The Novel Automated System (NAS) has the control system of the level of chlorine and acid (i.e. pH level) through a feedback in three forms of synchronous alerts. The feedback is in the form of an alert voice, a visible color, and a message on a digital screen. In addition, NAS contains a slide-in container in which chemicals are used to treat the problems of chlorine and acid levels independently. Moreover, NAS has a net in front of it to clean the pool on the surface of the water from leaves and wastes and so on which is controlled through a remote control. The material used is a lightweight aluminum with mechanical and electric parts integrated with each other. In fact, NAS is qualified to serve as an assistant security guard for swimming pools because it has the characteristics that make it unique and smart.

Keywords: novel automated system, pool safety, maintenance, pH level, digital screen

Procedia PDF Downloads 54
2346 Bio-Grouting Applications in Caprock Sealing for Geological CO2 Storage

Authors: Guijie Sang, Geo Davis, Momchil Terziev

Abstract:

Geological CO2 storage has been regarded as a promising strategy to mitigate the emission of greenhouse gas generated from traditional power stations and energy-intensive industry. Caprocks with very low permeability and ultra-fine pores create viscous and capillary barriers to guarantee CO2 sealing efficiency. However, caprock fractures, either naturally existing or artificially induced due to injection, could provide preferential paths for CO₂ escaping. Seeking an efficient technique to seal and strengthen caprock fractures is crucial. We apply microbial-induced-calcite-precipitation (MICP) technique for sealing and strengthening caprock fractures in the laboratory scale. The MICP bio-grouting technique has several advantages over conventional cement grouting methods, including its low viscosity, micron-size microbes (accessible to fine apertures), and low carbon footprint, among others. Different injection strategies are tested to achieve relatively homogenous calcite precipitation along the fractures, which is monitored dynamically based on laser ultrasonic technique. The MICP process in caprock fractures, which integrates the coupled flow and bio-chemical precipitation, is also modeled and validated through the experiment. The study could provide an effective bio-mediated grouting strategy for caprock sealing and thus ensuring a long-term safe geological CO2 storage.

Keywords: caprock sealing, geological CO2 storage, grouting strategy, microbial induced calcite precipitation

Procedia PDF Downloads 176
2345 The Green Propaganda: Paradoxes of Costa Rica as the Poster Child for Sustainable Tourism

Authors: Maria Jose Ramos Villagra

Abstract:

Since the boom of tourism in the late 80s and 90s, Costa Rica is considered as one of the leading countries for tourism. The size and geography of its territory, its low population density, and its image of being one of the most stable Latin American democracies make Costa Rica an attractive and safe target for foreign investors. Land ownership by foreign investors has increased as the natural resources in rural communities have been exhausted. When nature becomes an instrument to increase profit, it loses its communal value contributing to local communities losing their sovereignty and access to basic resources. The rural regions in proximity to the most tourist areas are often the most marginalized. The purpose of this research is to use the case of the rural community Sardinal and its struggle to protect its aquifer to investigate the economic and cultural consequences of the tourism boom in Costa Rican rural communities. The process of reclaiming the access to and the preservation of the aquifer enabled individuals to redefine their political views and their political power. The case of Sardinal broke the stereotypes about rural individuals and their ability to politically educate themselves and organize. Sardinal´s conflict brought to light the necessity of questioning the role of modern tourism as part of Costa Rica’s national identity, and as a tool for development

Keywords: Costa Rica, tourism, rural development, economy, ecotourism, environment, water, Sardinal

Procedia PDF Downloads 463
2344 Safety and Efficacy of Recombinant Clostridium botulinum Types B Vaccine Candidate

Authors: Mi-Hye Hwang, Young Min Son, Kichan Lee, Bang-Hun Hyun, Byeong Yeal Jung

Abstract:

Botulism is a paralytic disease of human beings and animals caused by neurotoxin produced by Clostridium botulinum. The neurotoxins are genetically distinguished into 8 types, A to H. Ingestion of performed toxin, usually types B, C, and D, have been shown to produce diseases in most cases of cattle botulism. Vaccination is the best measure to prevent cattle botulism. However, the commercially available toxoid-based vaccines are difficult and hazardous to produce. We produced recombinant protein using gene of heavy chain domain of botulinum toxin B of which binds to cellular receptor of neuron cells and used as immunogen. In this study, we evaluated the safety and efficacy of botulism vaccine composed of recombinant types B. Safety test was done by National Regulation for Veterinary Biologicals. For efficacy test, female ICR mice (5 weeks old) were subcutaneously injected, intraperitoneally challenged, and examined the survival rates compared with vaccination and non-vaccination group. Mouse survival rate of recombinant types B vaccine was above 80%, while one of non-vaccination group was 0%. A vaccine composed of recombinant types B was safe and efficacious in mouse. Our results suggest that recombinant heavy chain receptor binding domain can be used as an effective vaccine candidate for type B botulism.

Keywords: botulism, livestock, vaccine, recombinant protein, toxin

Procedia PDF Downloads 220
2343 Lean Construction Techniques in Construction Projects of Pakistan

Authors: Aftab Hameed Memon, Shadab Noor, Muhammad Akram Akhund

Abstract:

Lean construction is a philosophy adopted in the construction industry to increase the value of a project by reducing waste and improving construction productivity. Lean emphasizes on maximizing the value of a project with less expenditure. Globally, lean philosophy has received wider popularity in construction sector. Lean construction has supported the practitioners with several tools and techniques to implement at various stages of a construction project. Following the global trends, this study has investigated the lean practice in Pakistan. The level of implementation of different lean tools and techniques altogether with potential benefits experienced by its implementation in construction projects of Pakistan is analyzed. To achieve the targets, the opinion was sought by the practitioners involved in handling construction projects representing four stakeholders that are a client, consultant, contractors and material suppliers through a structured questionnaire. A total of 34 completed questionnaires were collected and then statistically analyzed. The findings of the analysis have highlighted that pull approach, work standardization, just in time, increase visualization tools, integrated project delivery method and fail-safe for quality are common lean techniques implemented in the local construction industry. While reduction in waste, client’s satisfaction, improved communication, visual control and proper task management are major benefits of the lean construction application.

Keywords: lean construction, lean tools and techniques, lean benefits, waste reduction, Pakistan

Procedia PDF Downloads 280
2342 Profiling, Antibacterial and Antioxidant Activity of Acacia decurrens (Willd) an Invasive South Africa Tree

Authors: Joe Modise, Bamidel Joseph Okoli, Nas Molefe, Imelda Ledwaba

Abstract:

The present study describes the chemical profile and antioxidant potential of the stem bark of Acacia decurrens. The methanol fraction of A. decurrens stem bark gave the highest yield (20 %), while the hexane fraction had the lowest yield (0.2 %). The GC-MS spectra of the hexane, chloroform and ethyl acetate fractions confirm the presence of fifty two major compounds and the ICP-OES analysis of the stem bark was found to contain Co(0.41), Zn(1.75), Mn(3.69), Ca(8.67), Ni(10.54), Mg(12.98), Cr(24.38), K(47.88), Fe(154.62) ppm; which is an indication of hyper-accumulation capacity. The UV-Visible spectra of showed four absorption maxima for hexane fraction at 665 (0.028), 410 (0.116), 335 (0.278) and 250 (0.007) nm, three for chloroform fraction at 665 (0.028), 335 (0.278) and 250 (0.007) nm , three for ethyl acetate fraction at 665 (0.070), 390 (0.648) and 345 (0.663) nm and three for methanol fraction at 385 (0.508), 310 (0.886) and 295 (0.899) nm respectively. Quantitative phytochemical screening indicated that the alkaloid (0.6-3.3) % and saponins (5.1-8.6) % contents of the various fractions were significantly lower than the tannin (30.9-55.8) mg TAE/g, steroid(13.92-41.2) %, phenol (40.6-65.5) mgGAE/g and flavonoids (210.2 -284.9) mg RUE/g contents. The antioxidant activity of the fractions was analysed by different methods and revealed good to moderate antioxidant potential with different IC50 values viz. (42.2-49.6) mg/mL for ABTS and (37.8-75.0) μg/ml for DPPH respectively, compared to standard antioxidants. Based on obtained results, the A.decurrens stem bark fractions can be a source of safe, sustainable natural antioxidant drug and can be exploited as a source of controlled green-heavy metal cleaner.

Keywords: Acacia decurrens, antioxidant, DPPH, ABTS, hyperaccumulation, Menstruum, ICP-OES, GC-MS, UV/visible

Procedia PDF Downloads 309
2341 Executive Order as an Effective Tool in Combating Insecurities and Human Rights Violations: The Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Following countless violations of Human Rights in Nigeria by the various arms and agencies of government; from the Military to the Federal Police and other law enforcement agencies, Nigeria has been riddled with several reports of acts by these agencies against the citizens, ranging from illegal arrest and imprisonment, torture, disappearing, and extrajudicial killings, just to mention a few. This paper, focuses on SARS (Special Anti-Robbery Squad), a division of the Nigeria Police Force, and its reported threats to the people’s security, particularly the Nigerian youths, with continuous violence, extortion, illegal arrest and imprisonment, terror, and extrajudicial activities resulting in maiming and in most cases death, thus infringing on the human rights of the people it’s sworn to protect. This research further analyses how the activities of SARS has over the years instigated fear on the average Nigerian youth, preventing the free participation in daily life, education, job, and individual development, in turn impeding the realization of their full potentials for growth and participation in collective national development. This research analyzes the executive order by the then Acting President (Vice-President) of Nigeria, directing the overhauling of SARS, and its implementation by the Federal Police Force in determining if it’s enough to prevent or put a stop to the continuous Human Rights abuse and threat to the security of the individual citizen. Concluding that although the order by the Acting President was given with an intent to halt the various violations by SARS, and the Inspector General of Police’s (IGP) subsequent action by releasing a statement following the order, the bureaucracy in Nigeria, with a history of incompetency and a return to 'business as usual' after a reduced public outcry, it’s most likely that there will not be adequate follow up put in place and these violations would be slowly 'swept under the rug' with SARS officials not held accountable. It is recommended therefore that the Federal Government through the NPF, following the reforms made, in collaboration with the mentioned Independent Human Rights and civil societies organizations should periodically produce unbiased and publicly accessible reports on the implementation of these reforms and progress made. This will go a long way in assuring the public of actual fulfillment of the restructuring, reduce fear by the youths and restore some public faith in the government.

Keywords: special anti-robbery squad, youths in Nigeria, overhaul, insecurities, human rights violations

Procedia PDF Downloads 290
2340 Barriers to Health and Safety Practices in South African Construction Industry: Subcontractors Perspective

Authors: Kenneth O. Otasowie, Matthew Ikuabe, Clinton Aigbavboa, Ayodeji Oke

Abstract:

Subcontracting has become a fundamental feature in the construction industry, particularly as most projects in South Africa (SA) are executed by subcontractors. However, the sector in SA contributes to the high level of occupational hazards and injuries recorded, despite Health and Safety (H&S) regulations being enforced in the industry. Hence, this study aims to evaluate the barriers to health and safety practices by subcontractors in SA Construction Industry. A survey design was adopted. A total number of one hundred and forty-four (144) questionnaires were administered to quantity surveyors, construction managers, construction project managers, project managers, architects, and civil and structural engineers, who are owners or work in small and medium enterprises in Guateng Province, SA and eighty-three (83) were returned and found suitable for analysis. Collected data were analysed using percentage, mean item score, standard deviation, and one-sample t-test. The findings show that lack of skilled workers, lack of safety training, and insufficient safety awareness are the most significant barriers to health and safety practices in SA Construction Industry. Therefore, the study recommends the improvement in skills of staff and adequate training for the safe execution of work be provided to all employees and supervisors in these subcontracting firms. These will mitigate the rate of accident occurrence on construction sites.

Keywords: barriers, health and safety, subcontractors, South Africa

Procedia PDF Downloads 86
2339 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 492